I hypothesize that The dictionary method will be a faster method to get into the encrypted folder than the "fake" password method.
Graph of Hypothesis
Experimental Design
My experiment will be conducted on my laptop, so really anywhere I am with my laptop. I will do the experiment on my own, but I might need a friend or two. I think I might need to do at least 5 Trials to get reliable data. While I conduct my experiment I will record the data on a printed out spread sheet. I will put pictures of the process and folders on the wiki.
Download (if not already downloaded) 7-ZIP file archiver
Create 10 folders in Documents
Put the same contents in folders
Open 7-ZIP
Find folders
Encrypt 5 folders using a word in the dictionary leave 5 not encrypted (Use an easy password for the encryption, should be in lower case to make it easier)
Tell your friend that they will need to use the dictionary (the one you used to find the password) and try every word until they get into the folder
Time how how long it takes
Record
Change password using another word close to the first and close to the same length
Re-peat 7-12 5 times
Change to next method create a password the same length of the first password
Tell your friend to create a ___ letter long word using _ and _ letters and some more of their choosing all lower case, Timing them starts when they start to plan the password
Have them type their password in, if fails, tell them to do a different word using directions from step 15 until they can get in
If step 15-16 succeeds, type in a different password and repeat 15-16
Repeat 15-17 5 times changing the password when a success and Record each time.
Data Table
Background Research
Doing my background research I learned how to recover passwords in different ways. For example the Dictionary method which uses a dictionary and you have to type in every word until you crack the password. Anyone form Governments to people at home use Encryption on passwords and other files and also internet passwords. I learned about block ciphers called Tiny Encryption Algorithm's, these are known for their simple description and implementation. As I was looking though websites I read a part of an article that explained a symmetric key. A symmetric key is when two different computers have the same encryption code and therefor they will be able to communicate through that.
The original purpose of this experiment was to see if there was a science to encryption and decryption, and if there was how could you measure it? The results of the experiment were not very good. I do think there is a science to encryption, but its just trying to measure it that didn't work. The experiment just ended up as a lesson on how to use shortcuts on the computer and how to properly look through the dictionary. By the time I finished the first method it was apparent that the second would not work, therefore I decided that I was not going to do it.
Data Table
Graphs
Photos
Data Analysis
Discussion
My hypothesis was can a person get into an encrypted file faster using the dictionary method or "fake" password method? Unfortunately my results did not support my hypothesis. I could not tell if there was a relationship because the experiment was so rocky I has to give more information than needed to do the experiment. Over all it is not a realistic experiment to do.
Encryption
Is there a science to Encryption?
Can a person get into an encrypted file faster using the dictionary method or "fake" password method?
Independent Variable: Time
Dependent Variable: Method
Variables That Need To Be Controlled:
1. Location2. Folder contents
3.Spelling
4. Person
5. Dictionary
6. Directions
Hypothesis
I hypothesize that The dictionary method will be a faster method to get into the encrypted folder than the "fake" password method.Graph of Hypothesis
Experimental Design
My experiment will be conducted on my laptop, so really anywhere I am with my laptop. I will do the experiment on my own, but I might need a friend or two. I think I might need to do at least 5 Trials to get reliable data. While I conduct my experiment I will record the data on a printed out spread sheet. I will put pictures of the process and folders on the wiki.
Materials list
Procedure
Data Table
Background Research
Doing my background research I learned how to recover passwords in different ways. For example the Dictionary method which uses a dictionary and you have to type in every word until you crack the password. Anyone form Governments to people at home use Encryption on passwords and other files and also internet passwords. I learned about block ciphers called Tiny Encryption Algorithm's, these are known for their simple description and implementation.As I was looking though websites I read a part of an article that explained a symmetric key. A symmetric key is when two different computers have the same encryption code and therefor they will be able to communicate through that.
References
"Password Recovery Methods." Password recovery software. Advanced office password recovery and security tools by LastBit.com. N.p., n.d. Web. 10 Feb. 2012. <http://lastbit.com/password-recovery-methods.asp>."Encryption - Wikipedia, the free encyclopedia." Wikipedia, the free encyclopedia. N.p., n.d. Web. 26 Jan. 2012. <http://en.wikipedia.org/wiki/Encryption>.
"Tiny Encryption Algorithm." Wikipedia. Wikimedia Foundation, 26 Feb. 2012. Web. 27 Feb. 2012. <http://en.wikipedia.org/wiki/Tiny_Encryption_Algorithm>.
HowStuffWorks. Web. 27 Feb. 2012. <http://computer.howstuffworks.com/encryption2.htm>.
Conclusion
The original purpose of this experiment was to see if there was a science to encryption and decryption, and if there was how could you measure it? The results of the experiment were not very good. I do think there is a science to encryption, but its just trying to measure it that didn't work. The experiment just ended up as a lesson on how to use shortcuts on the computer and how to properly look through the dictionary. By the time I finished the first method it was apparent that the second would not work, therefore I decided that I was not going to do it.
Data Table
Graphs
Photos
Data Analysis
Discussion
My hypothesis was can a person get into an encrypted file faster using the dictionary method or "fake" password method? Unfortunately my results did not support my hypothesis. I could not tell if there was a relationship because the experiment was so rocky I has to give more information than needed to do the experiment. Over all it is not a realistic experiment to do.